US20020156743A1 - Method and system for detecting pirated content - Google Patents
Method and system for detecting pirated content Download PDFInfo
- Publication number
- US20020156743A1 US20020156743A1 US09/843,102 US84310201A US2002156743A1 US 20020156743 A1 US20020156743 A1 US 20020156743A1 US 84310201 A US84310201 A US 84310201A US 2002156743 A1 US2002156743 A1 US 2002156743A1
- Authority
- US
- United States
- Prior art keywords
- content
- highly compressed
- recited
- pieces
- piece
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- This invention relates to piracy, and more particularly to detecting pirated content.
- digital content may be played back in analog form and an analog recording made of the content, which in turn can be converted to digital form again, such as a song stored in digital form being played back in analog form recorded on an analog tape recorder and then the analog recording converted back to digital form.
- Another proposed solution is to add watermarks or fingerprints to the digital content that cannot be removed without causing noticeable damage to the content.
- Software programs can then be designed to not copy any content that is watermarked or fingerprinted.
- Such proposed watermarks or fingerprints are designed such that they cannot be removed even when making an analog copy of the digital content.
- concerns have been raised as to whether such watermarks or fingerprints can be created and used in an effective manner.
- a content player stores a list of highly compressed content pieces that correspond to different pieces of content (e.g., audio content, video content, audio/video content, etc.).
- the list of highly compressed content pieces stored at a content player can be static, or alternatively change over time.
- a piece of content to be played back by the content player is compared to the highly compressed content pieces stored at the content player. If the piece of content to be played back matches one of the highly compressed content pieces, then appropriate responsive action is taken.
- This responsive action can vary, and can include, for example, checking for a valid license, giving the user the option to notify the publisher if he or she has unknowingly acquired a pirated copy of the content, etc.
- FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced.
- FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention.
- FIG. 3 is a block diagram illustrating an exemplary content player in more detail.
- FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention.
- FIG. 5 shows a general example of a computer that can be used in accordance with certain embodiments of the invention.
- FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced.
- Content is made available from a content publisher 102 and distributed as secure content 104 .
- Content 104 is referred to as being secure due to a highly compressed version of each portion of the content being made available to detect piracy, as discussed in more detail below.
- Secure content 104 is made available to content player 106 for playback to a user of player 106 .
- Content layer 106 can be any of a wide variety of devices for playing content, such as desktop or portable computers computing devices, gaming consoles, consumer electronic devices, automotive PCs, handheld PCs, portable music players, portable video players, personal digital assistants (PDAs), etc.
- PDAs personal digital assistants
- Content 104 can be made available in any of a wide variety of conventional formats, such as CD-ROM, DVD, magnetic tape, downloadable files (such as MP3), streaming media, etc. Additionally, content 104 represents any of a wide variety of conventional media content, such as audio content, video content, audio/video content, etc. Content 104 includes multiple pieces or portions, which can be an entire content work (e.g., a song for audio content, a movie or television program for audio/video content, etc.), or alternatively only part of a work (e.g., part of a song, part of a movie, etc.).
- content work e.g., a song for audio content, a movie or television program for audio/video content, etc.
- part of a work e.g., part of a song, part of a movie, etc.
- Content publisher 102 also makes pieces of highly compressed content 108 available to content player 106 .
- the highly compressed content pieces 108 are highly compressed versions of all of content 104 , or of portions of content 104 . These highly compressed content pieces refer to versions of portions of content 104 that are created in a manner so that the highly compressed form cannot be decompressed into an intelligible form yet can be compared to uncompressed content for equality with a high degree of accuracy. For example, if the highly compressed content piece for a particular song were to be audibly rendered, it would sound noticeably different from the playback of the song.
- Content publisher 102 makes highly compressed content available for each portion of content 104 .
- a pirate 110 makes unauthorized copies of content 104 and provides pirated content 112 to content player 106 .
- the user of content player 106 may or may not realize that the content 112 is pirated.
- Content player 106 compares the content at player 106 (for example, during playback of the content) to the subset of highly compressed content pieces 108 stored at player 106 . If a match between the content and one of the subset of highly compressed content pieces is identified, content player 106 takes appropriate action. This appropriate action can vary based on the programming of player 106 as well as the desires of the user of player 106 .
- Examples of appropriate action or actions include checking for a valid license at player 106 for the content, accessing another device (not shown) for a more thorough analysis to determine whether the content actually matches content for which player 106 has a license, allowing the user of player 106 to notify the content publisher or other authority of the existence of the pirated content (for example, in return for a potential reward), etc.
- FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention.
- Content player 106 stores pieces of content 130 and a highly compressed content list 132 .
- the highly compressed content list 132 includes one or more pieces of highly compressed content received from a highly compressed content source 134 , which in turn receives the highly compressed content pieces from a content compressor 140 (e.g., a computing device operated by publisher 102 of FIG. 1).
- Content player 106 communicates with source 134 via a network 136 .
- the highly compressed content pieces may be generated at player 106 .
- a portion of content (such as a song) may be communicated to content player 106 from content source 138 via network 136 .
- player 106 Upon receipt of such content, player 106 generates the highly compressed content piece, stores the generated piece in list 132 , and deletes the received portion from its memory. However, if the highly compressed content pieces are generated at player 106 , care should be taken to ensure that content player 106 is physically secure so that unauthorized copies of the received portion cannot be made prior to their deletion.
- Network 136 represents any of a wide variety of data communications networks, including public and/or private networks (such as the Internet), using both wired and wireless media. Communications between source 134 and content player 106 can be carried out in accordance with any of a wide variety of conventional protocols. Although only a single content player 106 , a single highly compressed content source 134 , and a single content source 138 are illustrated in FIG. 2, multiple such players 106 and sources 134 and 138 can be communicatively coupled together via network 136 .
- content player 106 compares the pieces of highly compressed content in list 132 with content pieces 130 (e.g., songs) that are made available to it.
- Content pieces 130 may be stored in memory of content player 106 or alternatively an external source accessible to player 106 , such as an optical disk. Multiple content portions 130 may be stored in player 106 , with the number of portions stored varying based on the amount memory available in player 106 and storage requirements of each content portion 130 .
- the comparison between content 130 and the highly compressed content pieces 132 can occur at various times. In one implementation, the comparison is performed during playback of the content portion 130 . Alternatively, the comparison may be performed at other times, such as during “down” times (for example, when player 106 is not playing back any content), when content is being downloaded for storage in player 106 , etc.
- Content player 106 stores as list 132 only a subset of pieces of highly compressed content available from source 134 (or generated from content available from source 138 ). In one implementation this subset is a very small subset of the available pieces of highly compressed content (for example, the subset may be only 10 pieces).
- the actual number of pieces of content stored in list 132 can vary over time and can vary on a per player basis. Additionally, the pieces of highly compressed content included in list 132 for a particular player 106 can vary over time. These pieces can be changed at any variety of intervals, such as at a particular time each day or each week, each time player 106 is coupled to network 136 , whenever requested by the user of player 106 , etc.
- the probability of a match existing between a portion of content 130 and a piece of highly compressed content in list 132 on any one player 106 is fairly small. However, if the number of players 106 that include a highly compressed content list 132 is sufficiently large, and each player 106 can maintain a different list 132 , the overall probability of a match existing between a portion of content 130 and a piece of highly compressed content in one of the lists 132 on at least one of the multiple players 106 is rather large. Thus, the use of highly compressed content list 132 is more useful in identifying pirated content across multiple devices (for example, players 106 ) than on any one particular device.
- the manner in which the content is highly compressed can vary.
- the goal of the compression is to generate a compressed version of the content portion that cannot be decompressed into an intelligible form while at the same time can be compared to uncompressed content for a determination of equality with a high degree of accuracy, even in light of changes made to the content portion (e.g., a slight speeding up or slowing down of the playback speed, an echo or reverberation added, various parts being filtered out (such as very high or low frequencies), etc.).
- the highly compressed content pieces themselves are not useable as playback substitutes for the underlying content portions (e.g., the highly compressed content piece for a song does not have enough information for a user to playback the highly compressed content piece and have it sound similar to the entirety of the song), yet the highly compressed content pieces can be compared to portions of content and the portion that the highly compressed content piece corresponds to reasonably accurately identified.
- the goal of compression is to generate a compressed version of a song that cannot be decompressed to a listenable form and yet can be compared to uncompressed songs for a determination of equality with a high degree of accuracy.
- the manner in which the comparison is made between a highly compressed piece and a content portion can vary, based at least in part on the manner in which the highly compressed piece was generated.
- a variety of different compression techniques can be used to generate a highly compressed content piece.
- One such technique is described in a co-pending U.S. patent application No. ______ , filed ______ , entitled “Recognizer of Audio-Content in Digital Signals”, to M. Kivanc Mihcak and Ramarathnam Venkatesan, attorney docket no. MS1-645US, which is hereby incorporated by reference.
- Another compression technique that can be used is based on the energy of the content over time. The energy of audio content can be calculated over a variety of different energy bands, and using a variety of different techniques.
- the energy is calculated by dividing the audio into fixed-sized segments (e.g., 10 millisecond segments) and then computing the sum of the squares of the signed audio samples in each segment.
- a song may be compressed by reducing the song to a list of energies computed for each 10 millisecond segment of the song. A number of contiguous groups of energies from this list are then extracted in any of a variety of different manners, such as at random. Groups of energies are extracted from this list, and in one implementation 10 groups of 100 samples of the energy (each representing a total of one second of the song) are extracted. These extracted energy groups for a particular song are then used as the highly compressed content piece for the corresponding song.
- the energies of these channels can be added together.
- other channel selection or combinations may be used, such as selecting the loudest channel, representing the energies independently, etc.
- each group e.g., the number of samples in each group
- the number of groups to be extracted can also vary. In one implementation, care should be taken to select the number of groups to be small enough so that highly compressed content pieces are not mistakenly matched to the wrong content portions.
- song #1 may include parts of song #2 within it, resulting in groups from the highly compressed content piece associated with song #2 matching song #1. Care should be taken that the number of groups used is not large enough so that enough of the groups from the highly compressed content piece associated with song #2 match song #1 to cause the comparison process to indicate that the highly compressed content piece associated with song #2 matches song #1.
- Different compression techniques can be used for different types of content (e.g., other than purely audio content).
- a list of the brightness of each frame of video may be generated, and groups of these brightness values extracted from the list and used as the highly compressed content piece for the corresponding video content.
- the brightness of each frame could be computed by summing the intensity of each pixel in the frame.
- the highly compressed content piece corresponding to the audio/video content may be made up of groups extracted from the audio part of the content, from the video part of the content, or alternatively both the audio and video parts (e.g., some groups from both).
- the groups of samples may be extracted from the list of energies for the content in any of a variety of manners.
- the set of groups of energies may be extracted according to some predetermined process or alternatively randomly.
- the selection of groups of samples is weighted so that more (or alternatively all) of the groups are selected from the beginning of the content.
- all of the groups may be selected from the first half of a song. This allows the comparison process to evaluate most (if not all) of the groups before the entire content portion is played back (assuming the comparison is being performed during playback of the content).
- a large set e.g., twenty or thirty
- some other criteria e.g., those with the highest energy
- a sub-set e.g., ten
- the energy for each segment of the content portion to be played back is extracted from the content portion using the same technique as was used to generate the highly compressed content piece.
- a sliding window (sliding one audio sample at a time) is used to select a group of energy samples of the same size as the groups used in generating the highly compressed content pieces. In situations where the comparison is being made as the content is being played back, the sliding window includes the energy samples for the most recently played back content.
- the value of the energy in each group of the highly compressed content piece is then compared to the energy of the generated group based on the content to be played back, and if the values for two groups are within a threshold amount then the process identifies a match between that group of the highly compressed content portion and the portion to be played back.
- each group may be normalized and then represented by a vector that includes one element for each energy value included in the group.
- a difference between these two vectors may be generated using any of a variety of well-known processes, such as by summing the squares of the differences, and the resultant value compared to the threshold.
- the comparison process then checks how many of the groups for each highly compressed content piece match the content portion to be played back. If greater than a threshold number of groups match (e.g., greater than 75% of the number of groups in the highly compressed content piece), then the highly compressed content piece is identified as a match to the content portion to be played back.
- a threshold number of groups e.g., greater than 75% of the number of groups in the highly compressed content piece
- the comparison process need not account for where in the corresponding content the different groups are extracted from (e.g., five seconds into a song, two minutes into a song, etc.). By not factoring the time that the groups correspond to into the comparison process, the comparison process is more tolerant of changes made to the content by time compression or expansion (e.g., speeding up or slowing down the content in an attempt to avoid a match).
- each group in the highly compressed content piece and the content portion may have a timestamp associated with it that identifies an offset (e.g., from the start of the song) into the song at which the group begins.
- the timestamps of the two groups need to be within a threshold distance of each other (e.g., within ten seconds of each other).
- an indication may be maintained of an ordering of the groups in each highly compressed content piece.
- the groups identified in the highly compressed content piece need to match, in the same order as they appear in the highly compressed content piece, groups in the content portion to be played back.
- Desirable features to be used include those features which represent some particularly audible characteristic (so that audible changes to the content can be detected). Examples of such additional features include computing and comparing the rhythm or beat of audio content, or the balance among the various frequency bands, or whether each energy sample in sequence is or is not greater than the previous sample (followed by a computation of the correlation of the binary values), or by a variety of other techniques.
- FIG. 3 is a block diagram illustrating an exemplary content player in more detail.
- Content player 106 includes a storage device 160 , which may be any of one or more types of storage devices including both volatile and non-volatile memory.
- storage device 160 may be one or more of random access memory (RAM), read-only memory (ROM), Flash memory, magnetic disk, optical disk, etc.
- Storage device 160 optionally includes content 130 to display to a user of player 106 via an output controller 162 .
- Output controller 162 renders content 130 via one or more output devices (not shown) of player 106 .
- the exact nature of output controller 162 can vary depending on the type of content to be rendered. For example, output controller 162 may convert digital content 130 into analog signals for playback of audio content by one or more speakers, output controller 162 may be a conventional video controller for outputting video signals, etc.
- media content for playback by content player 106 may be received from external source 164 .
- External source 164 may be any of a wide variety of conventional storage devices such as Flash memory, optical disk, magnetic disk, etc.
- Content from source 164 is received by playback controller 166 which communicates with output controller 162 to coordinate the playback of the content from source 164 .
- the content player 106 may also be used to forward content to other content players, either automatically or on request. This includes the case where the content player operates as a server on a network, whether or not it is used to play back content locally.
- Content player 106 also includes an interface 168 via which pieces of highly compressed content can be received from highly compressed content source 134 .
- content player 106 may include a compressor 170 which receives, via interface 168 , content from a content source (for example, source 138 of FIG. 2) and generates the highly compressed content pieces for list 132 of the based on the received content.
- a content source for example, source 138 of FIG. 2
- Content player 106 also includes a comparator 172 which compares content 130 and/or content from content source 164 to the highly compressed content pieces in list 132 . As discussed above, this comparison can be performed at a wide variety of different times, such as during playback of the content, when downloading the content, during times when content player 106 is neither downloading new content 130 or playing back content, etc. However, regardless of when (if ever) the content is actually played back by content player 106 , the content is available for playback and is also referred to herein as content to be played back.
- comparator 172 detects a match between a piece of highly compressed content from list 132 and the content to be played back (either content 130 or content from source 164 ), comparator 172 informs a resolver 174 of the match. Resolver 174 takes an appropriate action in response to such a match, which indicates that the content to be played back has been identified.
- Resolver 174 can take any of a wide variety of actions in response to comparator 172 indicating a match.
- resolver 174 compares the now-established identity of the content to be played back with a set of one or more licenses 176 maintained in storage device 160 .
- Licenses 176 identify content which the user of content player 106 is authorized to playback (for example, for which the user has purchased a license).
- Licenses 176 can be created and stored on storage device 160 in any of a variety of manners. Such licenses may be received from the content publisher or distributor along with the content licensed. Alternatively, the license may be a separate code (for example, a string of characters and/or digits) which the user must manually enter (for example, via a keyboard).
- Each license 176 identifies the content that it corresponds to.
- Resolver 174 compares the identification of the content to be played back with the licenses 176 to determine whether the user of content player 106 has acquired a valid license for the content. If resolver 174 identifies a license 176 for the content to be played back, then no further action need be taken (except for playing back or continuing to play back the content).
- resolver 174 notifies the user of player 106 that he or she has no valid license for the content to the playback.
- Resolver 174 can then give the user various options, such as: notify the publisher of the content (or other authority) of the unauthorized content and provide information to the publisher to assist in identifying the source of the unauthorized copy (various incentives may be provided to the user to reveal such information, such as a monetary award for assisting in identifying the source), ignore the lack of a license, attempt to obtain a valid license for the content, etc.
- other actions could be taken.
- resolver 174 may contact another remote source (not shown) to perform a more thorough analysis of whether the content to be played back matches a highly compressed content piece from list 132 (e.g., download an additional set of groups for the content and perform the comparison again using the larger set).
- resolver 174 may automatically notify the publisher of the pirated copy, resolver 174 may prevent the copy from being played back (or playback of the remaining portion may be prohibited), etc.
- the highly compressed content list 132 includes an indication of what license, if any, is needed in order to playback the associated content.
- the highly compressed content list 132 may include as the indication a public key of the publisher of the content.
- One of licenses 176 (previously signed by the publisher of the content using the private key of the publisher, or alternatively a chain of delegation certificates that leads to a license or other certificate signed by the publisher of the content using the private key of the publisher) can then be decrypted using the public key from the highly compressed content list 132 , and the decrypted license can be reviewed by resolver 174 to determine whether content player 106 has a license for the corresponding content.
- resolver 174 allows the content to be played back without taking any further action since it does not matter whether the license 176 exists for the content to be played back.
- FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention.
- the process of FIG. 4 is implemented by a content player 106 (of FIGS. 1 - 3 ) and may be performed in software.
- the content player receives a list update (act 202 ) that is to be used as the subset of highly compressed content pieces for the content player (for example, list 132 of FIG. 3).
- the content player receives a play request (act 204 ) for content stored at or otherwise accessible to the content player.
- the content player determines whether the content whose playback is requested matches any entry in the list (act 206 ). If there is no match, then the content player plays back the content (action 208 ).
- the content player checks whether it is licensed to playback the requested content (act 210 ). If the content player is licensed to playback the requested content, then it does so (act 208 ). However, if the content player is not licensed to playback the requested content, then the content player takes appropriate remedial action (act 212 ), such as those discussed above with reference to resolver 174 of FIG. 3.
- FIG. 5 shows a general example of a computer 342 that can be used in accordance with certain embodiments of the invention.
- Computer 342 is shown as an example of a computer in which various embodiments of the invention can be practiced, and can be, for example, a content player 106 of FIGS. 1 - 3 , or a source 134 or 138 or compressor 140 of FIG. 2, etc.
- Computer 342 is illustrated as only an example of a computing device that may be used with the invention; other devices may alternatively used that include more components or alternatively fewer components than those illustrated in FIG. 5.
- Computer 342 includes one or more processors or processing units 344 , a system memory 346 , and a bus 348 that couples various system components including the system memory 346 to processors 344 .
- the bus 348 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
- the system memory 346 includes read only memory (ROM) 350 and random access memory (RAM) 352 .
- ROM read only memory
- RAM random access memory
- a basic input/output system (BIOS) 354 containing the basic routines that help to transfer information between elements within computer 342 , such as during start-up, is stored in ROM 350 .
- Computer 342 further includes a hard disk drive 356 for reading from and writing to a hard disk, not shown, connected to bus 348 via a hard disk drive interface 357 (e.g., a SCSI, ATA, or other type of interface); a magnetic disk drive 358 for reading from and writing to a removable magnetic disk 360 , connected to bus 348 via a magnetic disk drive interface 361 ; and an optical disk drive 362 for reading from and/or writing to a removable optical disk 364 such as a CD ROM, DVD, or other optical media, connected to bus 348 via an optical drive interface 365 .
- the drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for computer 342 .
- exemplary environment described herein employs a hard disk, a removable magnetic disk 360 and a removable optical disk 364 , it will be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, random access memories (RAMs), read only memories (ROM), and the like, may also be used in the exemplary operating environment.
- RAMs random access memories
- ROM read only memories
- a number of program modules may be stored on the hard disk, magnetic disk 360 , optical disk 364 , ROM 350 , or RAM 352 , including an operating system 370 , one or more application programs 372 , other program modules 374 , and program data 376 .
- a user may enter commands and information into computer 342 through input devices such as keyboard 378 and pointing device 380 .
- Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
- These and other input devices are connected to the processing unit 344 through an interface 368 that is coupled to the system bus (e.g., a serial port interface, a parallel port interface, a universal serial bus (USB) interface, etc.).
- a monitor 384 or other type of display device is also connected to the system bus 348 via an interface, such as a video adapter 386 .
- personal computers typically include other peripheral output devices (not shown) such as speakers and printers.
- Computer 342 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 388 .
- the remote computer 388 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to computer 342 , although only a memory storage device 390 has been illustrated in FIG. 5.
- the logical connections depicted in FIG. 5 include a local area network (LAN) 392 and a wide area network (WAN) 394 .
- LAN local area network
- WAN wide area network
- Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet.
- computer 342 executes an Internet Web browser program (which may optionally be integrated into the operating system 370 ) such as the “Internet Explorer” Web browser manufactured and distributed by Microsoft Corporation of Redmond, Washington.
- computer 342 When used in a LAN networking environment, computer 342 is connected to the local network 392 through a network interface or adapter 396 . When used in a WAN networking environment, computer 342 typically includes a modem 398 or other means for establishing communications over the wide area network 394 , such as the Internet.
- the modem 398 which may be internal or external, is connected to the system bus 348 via a serial port interface 368 .
- program modules depicted relative to the personal computer 342 may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
- Computer 342 also includes a broadcast tuner 400 .
- Broadcast tuner 400 receives broadcast signals either directly (e.g., analog or digital cable transmissions fed directly into tuner 400 ) or via a reception device (e.g., via antenna or satellite dish).
- Computer 342 typically includes at least some form of computer readable media.
- Computer readable media can be any available media that can be accessed by computer 342 .
- Computer readable media may comprise computer storage media and communication media.
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which can be used to store the desired information and which can be accessed by computer 342 .
- Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
- program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- functionality of the program modules may be combined or distributed as desired in various embodiments.
- the invention may be implemented in hardware or a combination of hardware, software, and/or firmware.
- ASICs application specific integrated circuits
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
- This invention relates to piracy, and more particularly to detecting pirated content.
- The unauthorized copying of media content, often referred to as piracy, is a major concern to the authors, publishers, and distributors of such content. For example, audio content such as songs and video content such as movies can often times be easily copied by people without the legal right to do so. This problem has become particularly troublesome as digital content becomes more pervasive, as storage devices become increasingly cheaper, and as computers become more interconnected (e.g., via the Internet). Unauthorized copying of media content can take place in several forms. For example, digital content may be copied byte by byte on a computer. By way of another example, digital content may be played back in analog form and an analog recording made of the content, which in turn can be converted to digital form again, such as a song stored in digital form being played back in analog form recorded on an analog tape recorder and then the analog recording converted back to digital form.
- Various solutions have been proposed to prevent piracy of digital content. One such solution is to encrypt the digital content. Such encryption can often prevent, or at the very least make difficult, the use of unauthorized copies of the digital content. However, the content is inevitably decrypted at some point prior to the final presentation to the user and can be copied while it is unencrypted. For example, in the extreme case, encryption typically does not prevent an individual from making an analog recording of the digital content after it has been decrypted and converted to analog form, and then storing the analog recording in a digital form. Such a digital to analog to digital copying scheme typically results in a newly saved digital recording that is not encrypted, and thus can be freely copied and distributed to unauthorized users.
- Another proposed solution is to add watermarks or fingerprints to the digital content that cannot be removed without causing noticeable damage to the content. Software programs can then be designed to not copy any content that is watermarked or fingerprinted. Such proposed watermarks or fingerprints are designed such that they cannot be removed even when making an analog copy of the digital content. However, concerns have been raised as to whether such watermarks or fingerprints can be created and used in an effective manner.
- The invention described below addresses these disadvantages, providing methods and systems for detecting pirated content.
- A method and system for detecting pirated content is described herein.
- In accordance with one aspect, a content player stores a list of highly compressed content pieces that correspond to different pieces of content (e.g., audio content, video content, audio/video content, etc.). The list of highly compressed content pieces stored at a content player can be static, or alternatively change over time. A piece of content to be played back by the content player is compared to the highly compressed content pieces stored at the content player. If the piece of content to be played back matches one of the highly compressed content pieces, then appropriate responsive action is taken. This responsive action can vary, and can include, for example, checking for a valid license, giving the user the option to notify the publisher if he or she has unknowingly acquired a pirated copy of the content, etc.
- The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings. The same numbers are used throughout the figures to reference like components and/or features.
- FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced.
- FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention.
- FIG. 3 is a block diagram illustrating an exemplary content player in more detail.
- FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention.
- FIG. 5 shows a general example of a computer that can be used in accordance with certain embodiments of the invention.
- FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced. Content is made available from a
content publisher 102 and distributed assecure content 104.Content 104 is referred to as being secure due to a highly compressed version of each portion of the content being made available to detect piracy, as discussed in more detail below.Secure content 104 is made available tocontent player 106 for playback to a user ofplayer 106.Content layer 106 can be any of a wide variety of devices for playing content, such as desktop or portable computers computing devices, gaming consoles, consumer electronic devices, automotive PCs, handheld PCs, portable music players, portable video players, personal digital assistants (PDAs), etc.Content 104 can be made available in any of a wide variety of conventional formats, such as CD-ROM, DVD, magnetic tape, downloadable files (such as MP3), streaming media, etc. Additionally,content 104 represents any of a wide variety of conventional media content, such as audio content, video content, audio/video content, etc.Content 104 includes multiple pieces or portions, which can be an entire content work (e.g., a song for audio content, a movie or television program for audio/video content, etc.), or alternatively only part of a work (e.g., part of a song, part of a movie, etc.). -
Content publisher 102 also makes pieces of highlycompressed content 108 available tocontent player 106. The highlycompressed content pieces 108 are highly compressed versions of all ofcontent 104, or of portions ofcontent 104. These highly compressed content pieces refer to versions of portions ofcontent 104 that are created in a manner so that the highly compressed form cannot be decompressed into an intelligible form yet can be compared to uncompressed content for equality with a high degree of accuracy. For example, if the highly compressed content piece for a particular song were to be audibly rendered, it would sound noticeably different from the playback of the song.Content publisher 102 makes highly compressed content available for each portion ofcontent 104. Although numerous pieces of highly compressed content are made available bycontent publisher 102, only a subset of those pieces is typically maintained bycontent player 106. The number of pieces included in this subset can vary, however, care should be taken in selecting the number of pieces in this subset given the available memory incontent player 106 to store such pieces and the storage requirements of each piece. - In the environment of FIG. 1, a
pirate 110 makes unauthorized copies ofcontent 104 and providespirated content 112 tocontent player 106. The user ofcontent player 106 may or may not realize that thecontent 112 is pirated.Content player 106 compares the content at player 106 (for example, during playback of the content) to the subset of highlycompressed content pieces 108 stored atplayer 106. If a match between the content and one of the subset of highly compressed content pieces is identified,content player 106 takes appropriate action. This appropriate action can vary based on the programming ofplayer 106 as well as the desires of the user ofplayer 106. Examples of appropriate action or actions include checking for a valid license atplayer 106 for the content, accessing another device (not shown) for a more thorough analysis to determine whether the content actually matches content for whichplayer 106 has a license, allowing the user ofplayer 106 to notify the content publisher or other authority of the existence of the pirated content (for example, in return for a potential reward), etc. - FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention.
Content player 106 stores pieces ofcontent 130 and a highlycompressed content list 132. The highlycompressed content list 132 includes one or more pieces of highly compressed content received from a highlycompressed content source 134, which in turn receives the highly compressed content pieces from a content compressor 140 (e.g., a computing device operated bypublisher 102 of FIG. 1).Content player 106 communicates withsource 134 via anetwork 136. Alternatively, the highly compressed content pieces may be generated atplayer 106. For example, a portion of content (such as a song) may be communicated tocontent player 106 fromcontent source 138 vianetwork 136. Upon receipt of such content,player 106 generates the highly compressed content piece, stores the generated piece inlist 132, and deletes the received portion from its memory. However, if the highly compressed content pieces are generated atplayer 106, care should be taken to ensure thatcontent player 106 is physically secure so that unauthorized copies of the received portion cannot be made prior to their deletion. -
Network 136 represents any of a wide variety of data communications networks, including public and/or private networks (such as the Internet), using both wired and wireless media. Communications betweensource 134 andcontent player 106 can be carried out in accordance with any of a wide variety of conventional protocols. Although only asingle content player 106, a single highly compressedcontent source 134, and asingle content source 138 are illustrated in FIG. 2, multiplesuch players 106 andsources network 136. - During operation, as shown in FIG. 3,
content player 106 compares the pieces of highly compressed content inlist 132 with content pieces 130 (e.g., songs) that are made available to it.Content pieces 130 may be stored in memory ofcontent player 106 or alternatively an external source accessible toplayer 106, such as an optical disk.Multiple content portions 130 may be stored inplayer 106, with the number of portions stored varying based on the amount memory available inplayer 106 and storage requirements of eachcontent portion 130. The comparison betweencontent 130 and the highlycompressed content pieces 132 can occur at various times. In one implementation, the comparison is performed during playback of thecontent portion 130. Alternatively, the comparison may be performed at other times, such as during “down” times (for example, whenplayer 106 is not playing back any content), when content is being downloaded for storage inplayer 106, etc. -
Content player 106 stores aslist 132 only a subset of pieces of highly compressed content available from source 134 (or generated from content available from source 138). In one implementation this subset is a very small subset of the available pieces of highly compressed content (for example, the subset may be only 10 pieces). The actual number of pieces of content stored inlist 132 can vary over time and can vary on a per player basis. Additionally, the pieces of highly compressed content included inlist 132 for aparticular player 106 can vary over time. These pieces can be changed at any variety of intervals, such as at a particular time each day or each week, eachtime player 106 is coupled tonetwork 136, whenever requested by the user ofplayer 106, etc. - Because the number of pieces maintained in
list 132 is relatively small compared to the total number of content portions that may be available toplayer 106, the probability of a match existing between a portion ofcontent 130 and a piece of highly compressed content inlist 132 on any oneplayer 106 is fairly small. However, if the number ofplayers 106 that include a highlycompressed content list 132 is sufficiently large, and eachplayer 106 can maintain adifferent list 132, the overall probability of a match existing between a portion ofcontent 130 and a piece of highly compressed content in one of thelists 132 on at least one of themultiple players 106 is rather large. Thus, the use of highlycompressed content list 132 is more useful in identifying pirated content across multiple devices (for example, players 106) than on any one particular device. - The manner in which the content is highly compressed can vary. However, the goal of the compression is to generate a compressed version of the content portion that cannot be decompressed into an intelligible form while at the same time can be compared to uncompressed content for a determination of equality with a high degree of accuracy, even in light of changes made to the content portion (e.g., a slight speeding up or slowing down of the playback speed, an echo or reverberation added, various parts being filtered out (such as very high or low frequencies), etc.). In other words, the highly compressed content pieces themselves are not useable as playback substitutes for the underlying content portions (e.g., the highly compressed content piece for a song does not have enough information for a user to playback the highly compressed content piece and have it sound similar to the entirety of the song), yet the highly compressed content pieces can be compared to portions of content and the portion that the highly compressed content piece corresponds to reasonably accurately identified. For example, for audio content, the goal of compression is to generate a compressed version of a song that cannot be decompressed to a listenable form and yet can be compared to uncompressed songs for a determination of equality with a high degree of accuracy. Additionally, the manner in which the comparison is made between a highly compressed piece and a content portion can vary, based at least in part on the manner in which the highly compressed piece was generated.
- A variety of different compression techniques can be used to generate a highly compressed content piece. One such technique is described in a co-pending U.S. patent application No. ______ , filed ______ , entitled “Recognizer of Audio-Content in Digital Signals”, to M. Kivanc Mihcak and Ramarathnam Venkatesan, attorney docket no. MS1-645US, which is hereby incorporated by reference. Another compression technique that can be used is based on the energy of the content over time. The energy of audio content can be calculated over a variety of different energy bands, and using a variety of different techniques. In one implementation the energy is calculated by dividing the audio into fixed-sized segments (e.g., 10 millisecond segments) and then computing the sum of the squares of the signed audio samples in each segment. By way of example, a song may be compressed by reducing the song to a list of energies computed for each 10 millisecond segment of the song. A number of contiguous groups of energies from this list are then extracted in any of a variety of different manners, such as at random. Groups of energies are extracted from this list, and in one implementation 10 groups of 100 samples of the energy (each representing a total of one second of the song) are extracted. These extracted energy groups for a particular song are then used as the highly compressed content piece for the corresponding song. In situations where multiple channels are associated with the content (e.g., left and right channels for stereo audio content), the energies of these channels can be added together. Alternatively, other channel selection or combinations may be used, such as selecting the loudest channel, representing the energies independently, etc.
- The size of each group (e.g., the number of samples in each group) can vary. In one implementation, care should be taken to select the size of each group to be small enough that time compression and/or time expansion of the content does not adversely affect the comparison process. For example, a pirate may attempt to circumvent the piracy detection described herein by altering the timeline of the content for playback, thereby speeding up or slowing down playback slightly. If the size of each group is too large, then this timeline alteration can cause a match between a group of a highly compressed content piece to be missed.
- The number of groups to be extracted can also vary. In one implementation, care should be taken to select the number of groups to be small enough so that highly compressed content pieces are not mistakenly matched to the wrong content portions. For example,
song # 1 may include parts of song #2 within it, resulting in groups from the highly compressed content piece associated with song #2matching song # 1. Care should be taken that the number of groups used is not large enough so that enough of the groups from the highly compressed content piece associated with song #2match song # 1 to cause the comparison process to indicate that the highly compressed content piece associated with song #2matches song # 1. - Different compression techniques can be used for different types of content (e.g., other than purely audio content). For example, in the case of video content, a list of the brightness of each frame of video may be generated, and groups of these brightness values extracted from the list and used as the highly compressed content piece for the corresponding video content. For example, the brightness of each frame could be computed by summing the intensity of each pixel in the frame. By way of another example, in the case of audio/video content, the highly compressed content piece corresponding to the audio/video content may be made up of groups extracted from the audio part of the content, from the video part of the content, or alternatively both the audio and video parts (e.g., some groups from both).
- The groups of samples may be extracted from the list of energies for the content in any of a variety of manners. For example, the set of groups of energies may be extracted according to some predetermined process or alternatively randomly. In one implementation, the selection of groups of samples is weighted so that more (or alternatively all) of the groups are selected from the beginning of the content. For example, all of the groups may be selected from the first half of a song. This allows the comparison process to evaluate most (if not all) of the groups before the entire content portion is played back (assuming the comparison is being performed during playback of the content). By way of another example, a large set (e.g., twenty or thirty) of groups may be initially extracted at random, and then some other criteria (e.g., those with the highest energy) used to select a sub-set (e.g., ten) of groups.
- To compare a highly compressed content piece to a content portion that is to be played back, the energy for each segment of the content portion to be played back is extracted from the content portion using the same technique as was used to generate the highly compressed content piece. A sliding window (sliding one audio sample at a time) is used to select a group of energy samples of the same size as the groups used in generating the highly compressed content pieces. In situations where the comparison is being made as the content is being played back, the sliding window includes the energy samples for the most recently played back content. The value of the energy in each group of the highly compressed content piece is then compared to the energy of the generated group based on the content to be played back, and if the values for two groups are within a threshold amount then the process identifies a match between that group of the highly compressed content portion and the portion to be played back.
- The distance between the energies of two groups can be determined in any of a wide variety of conventional manners. For example, each group may be normalized and then represented by a vector that includes one element for each energy value included in the group. A difference between these two vectors may be generated using any of a variety of well-known processes, such as by summing the squares of the differences, and the resultant value compared to the threshold.
- The comparison process then checks how many of the groups for each highly compressed content piece match the content portion to be played back. If greater than a threshold number of groups match (e.g., greater than 75% of the number of groups in the highly compressed content piece), then the highly compressed content piece is identified as a match to the content portion to be played back.
- It should be noted that the comparison process need not account for where in the corresponding content the different groups are extracted from (e.g., five seconds into a song, two minutes into a song, etc.). By not factoring the time that the groups correspond to into the comparison process, the comparison process is more tolerant of changes made to the content by time compression or expansion (e.g., speeding up or slowing down the content in an attempt to avoid a match).
- Additional information may also be incorporated into the process of determining whether a highly compressed content piece matches the content portion to be played back. For example, each group in the highly compressed content piece and the content portion may have a timestamp associated with it that identifies an offset (e.g., from the start of the song) into the song at which the group begins. In order for a group in the highly compressed content piece to match a group of the content portion, the timestamps of the two groups need to be within a threshold distance of each other (e.g., within ten seconds of each other). By way of another example, an indication may be maintained of an ordering of the groups in each highly compressed content piece. In order for the highly compressed content piece to match the content portion to be played back, the groups identified in the highly compressed content piece need to match, in the same order as they appear in the highly compressed content piece, groups in the content portion to be played back.
- Although energy is described as being extracted above, other features of the content may also be extracted and used rather than energy. Desirable features to be used include those features which represent some particularly audible characteristic (so that audible changes to the content can be detected). Examples of such additional features include computing and comparing the rhythm or beat of audio content, or the balance among the various frequency bands, or whether each energy sample in sequence is or is not greater than the previous sample (followed by a computation of the correlation of the binary values), or by a variety of other techniques.
- FIG. 3 is a block diagram illustrating an exemplary content player in more detail.
Content player 106 includes astorage device 160, which may be any of one or more types of storage devices including both volatile and non-volatile memory. For example,storage device 160 may be one or more of random access memory (RAM), read-only memory (ROM), Flash memory, magnetic disk, optical disk, etc.Storage device 160 optionally includescontent 130 to display to a user ofplayer 106 via anoutput controller 162.Output controller 162 renderscontent 130 via one or more output devices (not shown) ofplayer 106. The exact nature ofoutput controller 162 can vary depending on the type of content to be rendered. For example,output controller 162 may convertdigital content 130 into analog signals for playback of audio content by one or more speakers,output controller 162 may be a conventional video controller for outputting video signals, etc. - Alternatively, media content for playback by
content player 106 may be received fromexternal source 164.External source 164 may be any of a wide variety of conventional storage devices such as Flash memory, optical disk, magnetic disk, etc. Content fromsource 164 is received byplayback controller 166 which communicates withoutput controller 162 to coordinate the playback of the content fromsource 164. - In addition to storing and playing back the content, the
content player 106 may also be used to forward content to other content players, either automatically or on request. This includes the case where the content player operates as a server on a network, whether or not it is used to play back content locally. -
Content player 106 also includes aninterface 168 via which pieces of highly compressed content can be received from highly compressedcontent source 134. Alternatively,content player 106 may include acompressor 170 which receives, viainterface 168, content from a content source (for example,source 138 of FIG. 2) and generates the highly compressed content pieces forlist 132 of the based on the received content. -
Content player 106 also includes acomparator 172 which comparescontent 130 and/or content fromcontent source 164 to the highly compressed content pieces inlist 132. As discussed above, this comparison can be performed at a wide variety of different times, such as during playback of the content, when downloading the content, during times whencontent player 106 is neither downloadingnew content 130 or playing back content, etc. However, regardless of when (if ever) the content is actually played back bycontent player 106, the content is available for playback and is also referred to herein as content to be played back. In theevent comparator 172 detects a match between a piece of highly compressed content fromlist 132 and the content to be played back (eithercontent 130 or content from source 164),comparator 172 informs aresolver 174 of the match.Resolver 174 takes an appropriate action in response to such a match, which indicates that the content to be played back has been identified. -
Resolver 174 can take any of a wide variety of actions in response tocomparator 172 indicating a match. In one implementation,resolver 174 compares the now-established identity of the content to be played back with a set of one ormore licenses 176 maintained instorage device 160.Licenses 176 identify content which the user ofcontent player 106 is authorized to playback (for example, for which the user has purchased a license).Licenses 176 can be created and stored onstorage device 160 in any of a variety of manners. Such licenses may be received from the content publisher or distributor along with the content licensed. Alternatively, the license may be a separate code (for example, a string of characters and/or digits) which the user must manually enter (for example, via a keyboard). Eachlicense 176 identifies the content that it corresponds to.Resolver 174 compares the identification of the content to be played back with thelicenses 176 to determine whether the user ofcontent player 106 has acquired a valid license for the content. Ifresolver 174 identifies alicense 176 for the content to be played back, then no further action need be taken (except for playing back or continuing to play back the content). - However, if no
license 176 corresponds to the content to be played back, and the content requires licensing,resolver 174 notifies the user ofplayer 106 that he or she has no valid license for the content to the playback.Resolver 174 can then give the user various options, such as: notify the publisher of the content (or other authority) of the unauthorized content and provide information to the publisher to assist in identifying the source of the unauthorized copy (various incentives may be provided to the user to reveal such information, such as a monetary award for assisting in identifying the source), ignore the lack of a license, attempt to obtain a valid license for the content, etc. Alternatively, other actions could be taken. For example,resolver 174 may contact another remote source (not shown) to perform a more thorough analysis of whether the content to be played back matches a highly compressed content piece from list 132 (e.g., download an additional set of groups for the content and perform the comparison again using the larger set). By way of other examples,resolver 174 may automatically notify the publisher of the pirated copy,resolver 174 may prevent the copy from being played back (or playback of the remaining portion may be prohibited), etc. - The highly
compressed content list 132 includes an indication of what license, if any, is needed in order to playback the associated content. For example, the highlycompressed content list 132 may include as the indication a public key of the publisher of the content. One of licenses 176 (previously signed by the publisher of the content using the private key of the publisher, or alternatively a chain of delegation certificates that leads to a license or other certificate signed by the publisher of the content using the private key of the publisher) can then be decrypted using the public key from the highlycompressed content list 132, and the decrypted license can be reviewed byresolver 174 to determine whethercontent player 106 has a license for the corresponding content. It should also be noted that situations can arise where the user ofcontent player 106 attempts to playback content for which no license is necessary, such as content within the public domain. In these situations,resolver 174 allows the content to be played back without taking any further action since it does not matter whether thelicense 176 exists for the content to be played back. - FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention. The process of FIG. 4 is implemented by a content player106 (of FIGS. 1-3) and may be performed in software. Initially, the content player receives a list update (act 202) that is to be used as the subset of highly compressed content pieces for the content player (for example,
list 132 of FIG. 3). Subsequently, the content player receives a play request (act 204) for content stored at or otherwise accessible to the content player. In response to the play request, the content player determines whether the content whose playback is requested matches any entry in the list (act 206). If there is no match, then the content player plays back the content (action 208). - However, if there is a match, and the entry in the highly compressed content list indicated that a license is needed, then the content player checks whether it is licensed to playback the requested content (act210). If the content player is licensed to playback the requested content, then it does so (act 208). However, if the content player is not licensed to playback the requested content, then the content player takes appropriate remedial action (act 212), such as those discussed above with reference to
resolver 174 of FIG. 3. - FIG. 5 shows a general example of a
computer 342 that can be used in accordance with certain embodiments of the invention.Computer 342 is shown as an example of a computer in which various embodiments of the invention can be practiced, and can be, for example, acontent player 106 of FIGS. 1-3, or asource compressor 140 of FIG. 2, etc.Computer 342 is illustrated as only an example of a computing device that may be used with the invention; other devices may alternatively used that include more components or alternatively fewer components than those illustrated in FIG. 5. -
Computer 342 includes one or more processors orprocessing units 344, asystem memory 346, and abus 348 that couples various system components including thesystem memory 346 toprocessors 344. Thebus 348 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. Thesystem memory 346 includes read only memory (ROM) 350 and random access memory (RAM) 352. A basic input/output system (BIOS) 354, containing the basic routines that help to transfer information between elements withincomputer 342, such as during start-up, is stored inROM 350. -
Computer 342 further includes ahard disk drive 356 for reading from and writing to a hard disk, not shown, connected tobus 348 via a hard disk drive interface 357 (e.g., a SCSI, ATA, or other type of interface); amagnetic disk drive 358 for reading from and writing to a removablemagnetic disk 360, connected tobus 348 via a magneticdisk drive interface 361; and anoptical disk drive 362 for reading from and/or writing to a removableoptical disk 364 such as a CD ROM, DVD, or other optical media, connected tobus 348 via anoptical drive interface 365. The drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data forcomputer 342. Although the exemplary environment described herein employs a hard disk, a removablemagnetic disk 360 and a removableoptical disk 364, it will be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, random access memories (RAMs), read only memories (ROM), and the like, may also be used in the exemplary operating environment. - A number of program modules may be stored on the hard disk,
magnetic disk 360,optical disk 364,ROM 350, orRAM 352, including anoperating system 370, one ormore application programs 372,other program modules 374, andprogram data 376. A user may enter commands and information intocomputer 342 through input devices such askeyboard 378 andpointing device 380. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are connected to theprocessing unit 344 through aninterface 368 that is coupled to the system bus (e.g., a serial port interface, a parallel port interface, a universal serial bus (USB) interface, etc.). Amonitor 384 or other type of display device is also connected to thesystem bus 348 via an interface, such as avideo adapter 386. In addition to the monitor, personal computers typically include other peripheral output devices (not shown) such as speakers and printers. -
Computer 342 operates in a networked environment using logical connections to one or more remote computers, such as aremote computer 388. Theremote computer 388 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative tocomputer 342, although only amemory storage device 390 has been illustrated in FIG. 5. The logical connections depicted in FIG. 5 include a local area network (LAN) 392 and a wide area network (WAN) 394. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. In certain embodiments of the invention,computer 342 executes an Internet Web browser program (which may optionally be integrated into the operating system 370) such as the “Internet Explorer” Web browser manufactured and distributed by Microsoft Corporation of Redmond, Washington. - When used in a LAN networking environment,
computer 342 is connected to thelocal network 392 through a network interface oradapter 396. When used in a WAN networking environment,computer 342 typically includes amodem 398 or other means for establishing communications over thewide area network 394, such as the Internet. Themodem 398, which may be internal or external, is connected to thesystem bus 348 via aserial port interface 368. In a networked environment, program modules depicted relative to thepersonal computer 342, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used. -
Computer 342 also includes abroadcast tuner 400.Broadcast tuner 400 receives broadcast signals either directly (e.g., analog or digital cable transmissions fed directly into tuner 400) or via a reception device (e.g., via antenna or satellite dish). -
Computer 342 typically includes at least some form of computer readable media. Computer readable media can be any available media that can be accessed bycomputer 342. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which can be used to store the desired information and which can be accessed bycomputer 342. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media. - The invention has been described in part in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
- For purposes of illustration, programs and other executable program components such as the operating system are illustrated herein as discrete blocks, although it is recognized that such programs and components reside at various times in different storage components of the computer, and are executed by the data processor(s) of the computer.
- Alternatively, the invention may be implemented in hardware or a combination of hardware, software, and/or firmware. For example, one or more application specific integrated circuits (ASICs) could be designed or programmed to carry out the invention.
- Conclusion
- Although the description above uses language that is specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the invention.
Claims (57)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/843,102 US7424747B2 (en) | 2001-04-24 | 2001-04-24 | Method and system for detecting pirated content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/843,102 US7424747B2 (en) | 2001-04-24 | 2001-04-24 | Method and system for detecting pirated content |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020156743A1 true US20020156743A1 (en) | 2002-10-24 |
US7424747B2 US7424747B2 (en) | 2008-09-09 |
Family
ID=25289079
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/843,102 Expired - Fee Related US7424747B2 (en) | 2001-04-24 | 2001-04-24 | Method and system for detecting pirated content |
Country Status (1)
Country | Link |
---|---|
US (1) | US7424747B2 (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020188840A1 (en) * | 2001-06-07 | 2002-12-12 | Isao Echizen | Method and system for contents control |
US20030016842A1 (en) * | 2001-07-23 | 2003-01-23 | Patton Charles M. | Digital content with information of latent value to purchaser and method for making the same |
US20030072491A1 (en) * | 2001-10-17 | 2003-04-17 | Sudheer Sirivara | Identifying image content |
US20030110126A1 (en) * | 2001-12-10 | 2003-06-12 | Dunkeld Bryan C. | System & method for unique digital asset identification and transaction management |
US20050163483A1 (en) * | 2004-01-22 | 2005-07-28 | Widevine Technologies, Inc. | Piracy prevention system |
US20060277609A1 (en) * | 2005-06-07 | 2006-12-07 | Marc Brandon | Method and apparatus for tracking pirated media |
US20070157320A1 (en) * | 2005-12-29 | 2007-07-05 | Navio Systems Inc. | Software, systems, and methods for processing digital bearer instruments |
US20080215896A1 (en) * | 2003-02-25 | 2008-09-04 | Steve Bourne | Issuing a Publisher Use License Off-Line in a Digital Rights Management (DRM) System |
US20080243693A1 (en) * | 2006-11-15 | 2008-10-02 | Navio Systems, Inc. | Title-acceptance and processing architecture |
US20080256627A1 (en) * | 2007-04-13 | 2008-10-16 | Heikki Kokkinen | Copyrights with post-payments for p2p file sharing |
WO2009020850A1 (en) * | 2007-08-03 | 2009-02-12 | Infoflows Corporation | Digital content management system and method |
US20090133079A1 (en) * | 2007-11-15 | 2009-05-21 | At&T Knowledge Ventures, L.P. | Detecting Distribution of Multimedia Content |
US20090328125A1 (en) * | 2008-06-30 | 2009-12-31 | Gits Peter M | Video fingerprint systems and methods |
US20090327334A1 (en) * | 2008-06-30 | 2009-12-31 | Rodriguez Arturo A | Generating Measures of Video Sequences to Detect Unauthorized Use |
US20090328237A1 (en) * | 2008-06-30 | 2009-12-31 | Rodriguez Arturo A | Matching of Unknown Video Content To Protected Video Content |
US7778929B2 (en) | 2006-12-13 | 2010-08-17 | Ricall Inc. | Online music and other copyrighted work search and licensing system |
US20130041826A1 (en) * | 2007-04-13 | 2013-02-14 | Vringo, Inc. | Content Purchaser Distribution Payment System |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US8781969B2 (en) | 2005-05-20 | 2014-07-15 | Microsoft Corporation | Extensible media rights |
US9509704B2 (en) | 2011-08-02 | 2016-11-29 | Oncircle, Inc. | Rights-based system |
US9621372B2 (en) | 2006-04-29 | 2017-04-11 | Oncircle, Inc. | Title-enabled networking |
US20170289156A1 (en) * | 2014-09-25 | 2017-10-05 | Amazon Technologies, Inc. | Broadcast-based trust establishment |
US10198719B2 (en) | 2005-12-29 | 2019-02-05 | Api Market, Inc. | Software, systems, and methods for processing digital bearer instruments |
US10303925B2 (en) * | 2016-06-24 | 2019-05-28 | Google Llc | Optimization processes for compressing media content |
US20210126945A1 (en) * | 2018-03-27 | 2021-04-29 | Niippon Telegraph And Telephone Corporation | Illegal content search device, illegal content search method, and program |
US11138207B2 (en) | 2015-09-22 | 2021-10-05 | Google Llc | Integrated dynamic interface for expression-based retrieval of expressive media content |
US20220327582A1 (en) * | 2021-04-09 | 2022-10-13 | i2i LLC | Method for Improving Service Outcomes Using Artificial Intelligence Techniques |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6834308B1 (en) * | 2000-02-17 | 2004-12-21 | Audible Magic Corporation | Method and apparatus for identifying media content presented on a media playing device |
WO2002082271A1 (en) | 2001-04-05 | 2002-10-17 | Audible Magic Corporation | Copyright detection and protection system and method |
US8972481B2 (en) | 2001-07-20 | 2015-03-03 | Audible Magic, Inc. | Playlist generation method and apparatus |
JP4343551B2 (en) * | 2003-02-25 | 2009-10-14 | パイオニア株式会社 | Information provision system and information provision program |
CN100571121C (en) * | 2004-08-27 | 2009-12-16 | 国际商业机器公司 | Tracing pirate in the wireless digital copyright management system and recognition methods |
US7912894B2 (en) * | 2007-05-15 | 2011-03-22 | Adams Phillip M | Computerized, copy-detection and discrimination apparatus and method |
US7971261B2 (en) * | 2007-06-12 | 2011-06-28 | Microsoft Corporation | Domain management for digital media |
US8006314B2 (en) | 2007-07-27 | 2011-08-23 | Audible Magic Corporation | System for identifying content of digital data |
US8667279B2 (en) | 2008-07-01 | 2014-03-04 | Sling Media, Inc. | Systems and methods for securely place shifting media content |
US8381310B2 (en) * | 2009-08-13 | 2013-02-19 | Sling Media Pvt. Ltd. | Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content |
US20100259610A1 (en) * | 2009-04-08 | 2010-10-14 | Celsia, Llc | Two-Dimensional Display Synced with Real World Object Movement |
US9160974B2 (en) | 2009-08-26 | 2015-10-13 | Sling Media, Inc. | Systems and methods for transcoding and place shifting media content |
US9043435B2 (en) | 2011-10-24 | 2015-05-26 | International Business Machines Corporation | Distributing licensed content across multiple devices |
US9081778B2 (en) | 2012-09-25 | 2015-07-14 | Audible Magic Corporation | Using digital fingerprints to associate data with a work |
WO2015021210A1 (en) * | 2013-08-06 | 2015-02-12 | Medknex Software, Llc | System and methods for protecting and using digital data |
Citations (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4136395A (en) * | 1976-12-28 | 1979-01-23 | International Business Machines Corporation | System for automatically proofreading a document |
US5142662A (en) * | 1986-03-03 | 1992-08-25 | Bell & Howell Company | Electronic publishing system |
US5390297A (en) * | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US5619571A (en) * | 1995-06-01 | 1997-04-08 | Sandstrom; Brent B. | Method for securely storing electronic records |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5757915A (en) * | 1995-08-25 | 1998-05-26 | Intel Corporation | Parameterized hash functions for access control |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5781629A (en) * | 1994-10-28 | 1998-07-14 | Surety Technologies, Inc. | Digital document authentication system |
US5818933A (en) * | 1995-07-07 | 1998-10-06 | Mitsubishi Denki Kabushiki Kaisha | Copyright control system |
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US5956034A (en) * | 1996-08-13 | 1999-09-21 | Softbook Press, Inc. | Method and apparatus for viewing electronic reading materials |
US5986690A (en) * | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US5987525A (en) * | 1997-04-15 | 1999-11-16 | Cddb, Inc. | Network delivery of interactive entertainment synchronized to playback of audio recordings |
US5995623A (en) * | 1996-01-30 | 1999-11-30 | Fuji Xerox Co., Ltd. | Information processing apparatus with a software protecting function |
US6012890A (en) * | 1996-10-04 | 2000-01-11 | Instabook Corporation | Electronic bookstore vending machine |
US6052717A (en) * | 1996-10-23 | 2000-04-18 | Family Systems, Ltd. | Interactive web book system |
US6119108A (en) * | 1998-10-01 | 2000-09-12 | Aires Systems Corporation | Secure electronic publishing system |
US6161183A (en) * | 1996-10-21 | 2000-12-12 | Fuji Xerox Co., Ltd. | Data verifying method apparatus for creating data to be verified and data verifying apparatus |
US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
US6301660B1 (en) * | 1997-07-31 | 2001-10-09 | Siemens Aktiengesellschaft | Computer system for protecting a file and a method for protecting a file |
US6314518B1 (en) * | 1997-08-26 | 2001-11-06 | U.S. Philips Corporation | System for transferring content information and supplemental information relating thereto |
US20010041989A1 (en) * | 2000-05-10 | 2001-11-15 | Vilcauskas Andrew J. | System for detecting and preventing distribution of intellectual property protected media |
US20010051996A1 (en) * | 2000-02-18 | 2001-12-13 | Cooper Robin Ross | Network-based content distribution system |
US6347375B1 (en) * | 1998-07-08 | 2002-02-12 | Ontrack Data International, Inc | Apparatus and method for remote virus diagnosis and repair |
US20020023020A1 (en) * | 1999-09-21 | 2002-02-21 | Kenyon Stephen C. | Audio identification system and method |
US6356287B1 (en) * | 1998-03-20 | 2002-03-12 | Nuvomedia, Inc. | Citation selection and routing feature for hand-held content display device |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6388957B2 (en) * | 1995-07-26 | 2002-05-14 | Sony Corporation | Recorded media player with database |
US20020129140A1 (en) * | 2001-03-12 | 2002-09-12 | Ariel Peled | System and method for monitoring unauthorized transport of digital content |
US20020152262A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
US6470333B1 (en) * | 1998-07-24 | 2002-10-22 | Jarg Corporation | Knowledge extraction system and method |
US6496802B1 (en) * | 2000-01-07 | 2002-12-17 | Mp3.Com, Inc. | System and method for providing access to electronic works |
US6577735B1 (en) * | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
US6594686B1 (en) * | 2000-03-02 | 2003-07-15 | Network Associates Technology, Inc. | Obtaining user responses in a virtual execution environment |
US6735699B1 (en) * | 1998-09-24 | 2004-05-11 | Ryuichi Sasaki | Method and system for monitoring use of digital works |
US6766305B1 (en) * | 1999-03-12 | 2004-07-20 | Curl Corporation | Licensing system and method for freely distributed information |
US6868405B1 (en) * | 1999-11-29 | 2005-03-15 | Microsoft Corporation | Copy detection for digitally-formatted works |
US6868494B1 (en) * | 1999-03-09 | 2005-03-15 | Sony Corporation | Reproducing apparatus and information distribution system |
US6873975B1 (en) * | 1999-04-06 | 2005-03-29 | Fujitsu Limited | Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method |
US6915425B2 (en) * | 2000-12-13 | 2005-07-05 | Aladdin Knowledge Systems, Ltd. | System for permitting off-line playback of digital content, and for managing content rights |
US7266202B1 (en) * | 1999-02-17 | 2007-09-04 | Sony Corporation | Information processing device and method, and program storage medium |
US7349381B1 (en) * | 2000-04-28 | 2008-03-25 | Rockwell Collins | Synchronization technique for spread spectrum frequency hopped data links and radios using the same |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000286836A (en) | 1999-03-30 | 2000-10-13 | Fujitsu Ltd | Certification device and recording medium |
-
2001
- 2001-04-24 US US09/843,102 patent/US7424747B2/en not_active Expired - Fee Related
Patent Citations (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4136395A (en) * | 1976-12-28 | 1979-01-23 | International Business Machines Corporation | System for automatically proofreading a document |
US5142662A (en) * | 1986-03-03 | 1992-08-25 | Bell & Howell Company | Electronic publishing system |
US5390297A (en) * | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US5986690A (en) * | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US5781629A (en) * | 1994-10-28 | 1998-07-14 | Surety Technologies, Inc. | Digital document authentication system |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5619571A (en) * | 1995-06-01 | 1997-04-08 | Sandstrom; Brent B. | Method for securely storing electronic records |
US5818933A (en) * | 1995-07-07 | 1998-10-06 | Mitsubishi Denki Kabushiki Kaisha | Copyright control system |
US6388957B2 (en) * | 1995-07-26 | 2002-05-14 | Sony Corporation | Recorded media player with database |
US5757915A (en) * | 1995-08-25 | 1998-05-26 | Intel Corporation | Parameterized hash functions for access control |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5995623A (en) * | 1996-01-30 | 1999-11-30 | Fuji Xerox Co., Ltd. | Information processing apparatus with a software protecting function |
US5956034A (en) * | 1996-08-13 | 1999-09-21 | Softbook Press, Inc. | Method and apparatus for viewing electronic reading materials |
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US6012890A (en) * | 1996-10-04 | 2000-01-11 | Instabook Corporation | Electronic bookstore vending machine |
US6161183A (en) * | 1996-10-21 | 2000-12-12 | Fuji Xerox Co., Ltd. | Data verifying method apparatus for creating data to be verified and data verifying apparatus |
US6052717A (en) * | 1996-10-23 | 2000-04-18 | Family Systems, Ltd. | Interactive web book system |
US5987525A (en) * | 1997-04-15 | 1999-11-16 | Cddb, Inc. | Network delivery of interactive entertainment synchronized to playback of audio recordings |
US6301660B1 (en) * | 1997-07-31 | 2001-10-09 | Siemens Aktiengesellschaft | Computer system for protecting a file and a method for protecting a file |
US6314518B1 (en) * | 1997-08-26 | 2001-11-06 | U.S. Philips Corporation | System for transferring content information and supplemental information relating thereto |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6356287B1 (en) * | 1998-03-20 | 2002-03-12 | Nuvomedia, Inc. | Citation selection and routing feature for hand-held content display device |
US6347375B1 (en) * | 1998-07-08 | 2002-02-12 | Ontrack Data International, Inc | Apparatus and method for remote virus diagnosis and repair |
US6470333B1 (en) * | 1998-07-24 | 2002-10-22 | Jarg Corporation | Knowledge extraction system and method |
US6735699B1 (en) * | 1998-09-24 | 2004-05-11 | Ryuichi Sasaki | Method and system for monitoring use of digital works |
US6119108A (en) * | 1998-10-01 | 2000-09-12 | Aires Systems Corporation | Secure electronic publishing system |
US6577735B1 (en) * | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
US7266202B1 (en) * | 1999-02-17 | 2007-09-04 | Sony Corporation | Information processing device and method, and program storage medium |
US6868494B1 (en) * | 1999-03-09 | 2005-03-15 | Sony Corporation | Reproducing apparatus and information distribution system |
US6766305B1 (en) * | 1999-03-12 | 2004-07-20 | Curl Corporation | Licensing system and method for freely distributed information |
US6873975B1 (en) * | 1999-04-06 | 2005-03-29 | Fujitsu Limited | Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method |
US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
US20020023020A1 (en) * | 1999-09-21 | 2002-02-21 | Kenyon Stephen C. | Audio identification system and method |
US6868405B1 (en) * | 1999-11-29 | 2005-03-15 | Microsoft Corporation | Copy detection for digitally-formatted works |
US6496802B1 (en) * | 2000-01-07 | 2002-12-17 | Mp3.Com, Inc. | System and method for providing access to electronic works |
US20010051996A1 (en) * | 2000-02-18 | 2001-12-13 | Cooper Robin Ross | Network-based content distribution system |
US6594686B1 (en) * | 2000-03-02 | 2003-07-15 | Network Associates Technology, Inc. | Obtaining user responses in a virtual execution environment |
US7349381B1 (en) * | 2000-04-28 | 2008-03-25 | Rockwell Collins | Synchronization technique for spread spectrum frequency hopped data links and radios using the same |
US20010041989A1 (en) * | 2000-05-10 | 2001-11-15 | Vilcauskas Andrew J. | System for detecting and preventing distribution of intellectual property protected media |
US6915425B2 (en) * | 2000-12-13 | 2005-07-05 | Aladdin Knowledge Systems, Ltd. | System for permitting off-line playback of digital content, and for managing content rights |
US20020129140A1 (en) * | 2001-03-12 | 2002-09-12 | Ariel Peled | System and method for monitoring unauthorized transport of digital content |
US20020152262A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
Cited By (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7478432B2 (en) * | 2001-06-07 | 2009-01-13 | Hitachi, Ltd. | Method and system for contents control |
US20020188840A1 (en) * | 2001-06-07 | 2002-12-12 | Isao Echizen | Method and system for contents control |
US20030016842A1 (en) * | 2001-07-23 | 2003-01-23 | Patton Charles M. | Digital content with information of latent value to purchaser and method for making the same |
US20030072491A1 (en) * | 2001-10-17 | 2003-04-17 | Sudheer Sirivara | Identifying image content |
US8259989B2 (en) | 2001-10-17 | 2012-09-04 | Intel Corporation | Identifying image content |
US6961467B2 (en) * | 2001-10-17 | 2005-11-01 | Intel Corporation | Identifying image content |
US20060050964A1 (en) * | 2001-10-17 | 2006-03-09 | Sudheer Sirivara | Identifying image content |
US8626838B2 (en) | 2001-12-10 | 2014-01-07 | Content Technologies, Llc | Digital media asset identification system and method |
US20080215633A1 (en) * | 2001-12-10 | 2008-09-04 | Dunkeld Bryan C | Digital Media Asset Conversion System and Method |
US20080215632A1 (en) * | 2001-12-10 | 2008-09-04 | Dunkeld Bryan C | Digital Media Asset Identification System and Method |
US8001052B2 (en) * | 2001-12-10 | 2011-08-16 | Dunkeld Bryan C | System and method for unique digital asset identification and transaction management |
US8583556B2 (en) | 2001-12-10 | 2013-11-12 | Content Technologies, Llc | Method of providing a digital asset for distribution |
US8200581B2 (en) | 2001-12-10 | 2012-06-12 | Content Technologies, Llc | Digital media asset conversion system and method |
US20030110126A1 (en) * | 2001-12-10 | 2003-06-12 | Dunkeld Bryan C. | System & method for unique digital asset identification and transaction management |
US8606856B2 (en) | 2001-12-10 | 2013-12-10 | Content Technologies, Llc | Digital media asset identification system and method |
US8706636B2 (en) | 2001-12-10 | 2014-04-22 | Content Technologies Llc | System and method for unique digital asset identification and transaction management |
US8719171B2 (en) | 2003-02-25 | 2014-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US20080215896A1 (en) * | 2003-02-25 | 2008-09-04 | Steve Bourne | Issuing a Publisher Use License Off-Line in a Digital Rights Management (DRM) System |
US8700535B2 (en) * | 2003-02-25 | 2014-04-15 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US20050163483A1 (en) * | 2004-01-22 | 2005-07-28 | Widevine Technologies, Inc. | Piracy prevention system |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8781969B2 (en) | 2005-05-20 | 2014-07-15 | Microsoft Corporation | Extensible media rights |
US20060277609A1 (en) * | 2005-06-07 | 2006-12-07 | Marc Brandon | Method and apparatus for tracking pirated media |
US20070157320A1 (en) * | 2005-12-29 | 2007-07-05 | Navio Systems Inc. | Software, systems, and methods for processing digital bearer instruments |
US9177338B2 (en) * | 2005-12-29 | 2015-11-03 | Oncircle, Inc. | Software, systems, and methods for processing digital bearer instruments |
US10198719B2 (en) | 2005-12-29 | 2019-02-05 | Api Market, Inc. | Software, systems, and methods for processing digital bearer instruments |
US9621372B2 (en) | 2006-04-29 | 2017-04-11 | Oncircle, Inc. | Title-enabled networking |
US10467606B2 (en) | 2006-04-29 | 2019-11-05 | Api Market, Inc. | Enhanced title processing arrangement |
US10999094B2 (en) | 2006-04-29 | 2021-05-04 | Api Market, Inc. | Title-enabled networking |
US10192234B2 (en) | 2006-11-15 | 2019-01-29 | Api Market, Inc. | Title materials embedded within media formats and related applications |
US10380621B2 (en) * | 2006-11-15 | 2019-08-13 | Api Market, Inc. | Title-acceptance and processing architecture |
US11494801B2 (en) | 2006-11-15 | 2022-11-08 | Api Market, Inc. | Methods and medium for title materials embedded within media formats and related applications |
US20080243693A1 (en) * | 2006-11-15 | 2008-10-02 | Navio Systems, Inc. | Title-acceptance and processing architecture |
US7778929B2 (en) | 2006-12-13 | 2010-08-17 | Ricall Inc. | Online music and other copyrighted work search and licensing system |
US20130067602A1 (en) * | 2007-04-13 | 2013-03-14 | Vringo Infrastructure, Inc. | Copyrights with Post-Payments for P2P File Sharing |
US20130041826A1 (en) * | 2007-04-13 | 2013-02-14 | Vringo, Inc. | Content Purchaser Distribution Payment System |
US20080256627A1 (en) * | 2007-04-13 | 2008-10-16 | Heikki Kokkinen | Copyrights with post-payments for p2p file sharing |
WO2008125992A1 (en) * | 2007-04-13 | 2008-10-23 | Nokia Corporation | Copyrights with post-payments for p2p file sharing |
WO2009020850A1 (en) * | 2007-08-03 | 2009-02-12 | Infoflows Corporation | Digital content management system and method |
US8601503B2 (en) | 2007-11-15 | 2013-12-03 | At&T Intellectual Property I, L.P. | Detecting distribution of multimedia content |
US8359609B2 (en) | 2007-11-15 | 2013-01-22 | At&T Intellectual Property I, L.P. | Detecting distribution of multimedia content |
US20110197240A1 (en) * | 2007-11-15 | 2011-08-11 | At&T Intellectual Property I, L.P. | Detecting distribution of multimedia content |
US7945924B2 (en) * | 2007-11-15 | 2011-05-17 | At&T Intellectual Property I, L.P. | Detecting distribution of multimedia content |
US20090133079A1 (en) * | 2007-11-15 | 2009-05-21 | At&T Knowledge Ventures, L.P. | Detecting Distribution of Multimedia Content |
US20090328125A1 (en) * | 2008-06-30 | 2009-12-31 | Gits Peter M | Video fingerprint systems and methods |
US20090328237A1 (en) * | 2008-06-30 | 2009-12-31 | Rodriguez Arturo A | Matching of Unknown Video Content To Protected Video Content |
US20090327334A1 (en) * | 2008-06-30 | 2009-12-31 | Rodriguez Arturo A | Generating Measures of Video Sequences to Detect Unauthorized Use |
US8347408B2 (en) * | 2008-06-30 | 2013-01-01 | Cisco Technology, Inc. | Matching of unknown video content to protected video content |
US8259177B2 (en) * | 2008-06-30 | 2012-09-04 | Cisco Technology, Inc. | Video fingerprint systems and methods |
US10706168B2 (en) | 2011-08-02 | 2020-07-07 | Api Market, Inc. | Rights-based system |
US9509704B2 (en) | 2011-08-02 | 2016-11-29 | Oncircle, Inc. | Rights-based system |
US10073984B2 (en) | 2011-08-02 | 2018-09-11 | Api Market, Inc. | Rights based system |
US11599657B2 (en) | 2011-08-02 | 2023-03-07 | Api Market, Inc. | Rights-based system |
US10587617B2 (en) * | 2014-09-25 | 2020-03-10 | Amazon Technologies, Inc. | Broadcast-based trust establishment |
US20170289156A1 (en) * | 2014-09-25 | 2017-10-05 | Amazon Technologies, Inc. | Broadcast-based trust establishment |
US11138207B2 (en) | 2015-09-22 | 2021-10-05 | Google Llc | Integrated dynamic interface for expression-based retrieval of expressive media content |
US10671836B2 (en) * | 2016-06-24 | 2020-06-02 | Google Llc | Optimization processes for compressing media content |
US10303925B2 (en) * | 2016-06-24 | 2019-05-28 | Google Llc | Optimization processes for compressing media content |
US20210126945A1 (en) * | 2018-03-27 | 2021-04-29 | Niippon Telegraph And Telephone Corporation | Illegal content search device, illegal content search method, and program |
US12069090B2 (en) * | 2018-03-27 | 2024-08-20 | Nippon Telegraph And Telephone Corporation | Illegal content search device, illegal content search method, and program |
US20220327582A1 (en) * | 2021-04-09 | 2022-10-13 | i2i LLC | Method for Improving Service Outcomes Using Artificial Intelligence Techniques |
US11995696B2 (en) * | 2021-04-09 | 2024-05-28 | i2i LLC | Method for improving service outcomes using artificial intelligence techniques |
Also Published As
Publication number | Publication date |
---|---|
US7424747B2 (en) | 2008-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7424747B2 (en) | Method and system for detecting pirated content | |
US20190114396A1 (en) | Methods and apparatus for sharing, transferring and removing previously owned digital media | |
US8850214B2 (en) | Methods and systems for encoding and protecting data using digital signature and watermarking techniques | |
US5822432A (en) | Method for human-assisted random key generation and application for digital watermark system | |
US7657752B2 (en) | Digital signal watermaker | |
US7460683B2 (en) | Asymmetric spread-spectrum watermarking systems and methods of use | |
US6802003B1 (en) | Method and apparatus for authenticating content | |
US20020112163A1 (en) | Ensuring legitimacy of digital media | |
US20030233547A1 (en) | Systems and methods for preventing and detecting unauthorized copying of software | |
JP2002055884A (en) | Contents copy management system, its method, information processor, its method, server and storage medium | |
JP2005227756A (en) | Desynchronized fingerprinting method and system, for digital multimedia data | |
KR20040101299A (en) | Feature-based audio content identification | |
US20090007279A1 (en) | Rights enforcement of unencrypted content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DETREVILLE, JOHN D.;REEL/FRAME:011768/0847 Effective date: 20010420 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0001 Effective date: 20141014 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20200909 |